Service-to-service communication among microservices puts more data on the wire compared to monoliths. Using mutual TLS (mTLS) to encrypt and authenticate that communication is crucial. Here we dive deep into the mTLS implementation in NGINX Service Mesh.
Discover how to control and manage traffic in Kubernetes effortlessly, with demonstrations of NGINX Service Mesh and NGINX Ingress Controller.
In this blog we compare the performance of the NGINX Controller API Management Module and Kong. The API Management Module outperforms Kong on every metric: added latency, API calls per second (with and without JWT authentication), and CPU usage.
More than 87% of websites are SSL-encrypted and organizations can have thousands of certificates in production. A more flexible approach to managing certificates is needed. In this webinar we cover how to load certificates dynamically and additional newly released features.
TLS 1.3, the latest version of the protocol, was released in August 2018. TLS 1.3 is faster and more secure than TLS 1.2. In this webinar we cover what’s new in TLS 1.3 and how to use it with NGINX, plus other new features in NGINX Open Source and NGINX Plus.
NGINX Plus is often deployed in a cluster, and the new features in R16 help our customers working in a clustered environment. New features include global rate limiting, a cluster-aware key-value store, Random with Two Choices load-balancing algorithm, and more.
Learn how to install the OWASP Core Rule Set (CRS) with NGINX and ModSecurity, as well as how to tune it. The CRS protects against many types of attack, including SQL Injection (SQLi), Local File Inclusion (LFI), and Remote Code Execution (RCE).
The NGINX Microservices Reference Architecture has been one of our most useful assets, showing how to use a scalable set of three models for progressively more complex and powerful microservices apps. Version 1.2 features greater integration with Kubernetes.
The $ssl_preread_protocol variable introduced in NGINX 1.15.2 allows you to distinguish between SSL/TLS and other protocols when forwarding traffic using a TCP proxy. This is useful if you want to avoid firewall restrictions by running (for example) SSL/TLS and SSH services on the same port.